Some vulnerabilities have been reported in Adobe Reader and Adobe Acrobat, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system.

1) Some unspecified errors can be exploited to cause memory corruption and execute arbitrary code.

2) Some other unspecified errors can be exploited to cause memory corruption and execute arbitrary code.

3) An integer underflow error can be exploited to execute arbitrary code.

4) A use-after-free error can be exploited to bypass the Adobe Reader sandbox protection.

5) An unspecified error related to the Javascript API can be exploited to disclose certain information.

6) An unspecified error can be exploited to cause a stack overflow and execute arbitrary code.

7) A boundary error within AdobeCollabSync.exe when reading registry values can be exploited to cause a stack-based buffer overflow and bypass the sandbox.

8) Another unspecified error can be exploited to cause buffer overflows and execute arbitrary code.

9) An integer overflow error can be exploited to execute arbitrary code.

10) An integer overflow error within the AcroForm.api plugin when decoding RLE8 compressed BMP files can be exploited to cause a heap-based buffer overflow.

11) An unspecified error exists related to handling of blacklisted domains in the operating system.

The vulnerabilities are reported in the following products and versions: